Login / Signup
Assume but Verify: Deductive Verification of Leaked Information in Concurrent Applications.
Toby Murray
Mukesh Tiwari
Gidon Ernst
David A. Naumann
Published in:
CCS (2023)
Keyphrases
</>
information sources
spatial information
information content
information extraction
information fusion
information overload
data sets
data mining
machine learning
genetic algorithm
database systems
information sharing